Provided by Vertical Structure
Introduction
Fundamental Concepts
Threat Modelling- an Introduction
How Attackers Identify Targets & Perform Reconnaissance
The OWASP Top 10 (Part1)
The OWASP Top 10 (Part2)
Capture The Flag
Threat Modelling
Automated Security Testing
Additional Common Flaws